Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/vlc@0?distro=trixie
Typedeb
Namespacedebian
Namevlc
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version0.8.4.debian-2
Latest_non_vulnerable_version3.0.23-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-75p5-9stz-dffu
vulnerability_id VCID-75p5-9stz-dffu
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6934
reference_id
reference_type
scores
0
value 0.03978
scoring_system epss
scoring_elements 0.88343
published_at 2026-04-01T12:55:00Z
1
value 0.03978
scoring_system epss
scoring_elements 0.88352
published_at 2026-04-02T12:55:00Z
2
value 0.03978
scoring_system epss
scoring_elements 0.88366
published_at 2026-04-04T12:55:00Z
3
value 0.03978
scoring_system epss
scoring_elements 0.88371
published_at 2026-04-07T12:55:00Z
4
value 0.03978
scoring_system epss
scoring_elements 0.8839
published_at 2026-04-08T12:55:00Z
5
value 0.03978
scoring_system epss
scoring_elements 0.88396
published_at 2026-04-09T12:55:00Z
6
value 0.03978
scoring_system epss
scoring_elements 0.88406
published_at 2026-04-11T12:55:00Z
7
value 0.03978
scoring_system epss
scoring_elements 0.88399
published_at 2026-04-13T12:55:00Z
8
value 0.03978
scoring_system epss
scoring_elements 0.88413
published_at 2026-04-16T12:55:00Z
9
value 0.03978
scoring_system epss
scoring_elements 0.88409
published_at 2026-04-21T12:55:00Z
10
value 0.03978
scoring_system epss
scoring_elements 0.88425
published_at 2026-04-24T12:55:00Z
11
value 0.03978
scoring_system epss
scoring_elements 0.8843
published_at 2026-04-26T12:55:00Z
12
value 0.03978
scoring_system epss
scoring_elements 0.88431
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6934
1
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2013-6934
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75p5-9stz-dffu
1
url VCID-7q9n-v18z-z7av
vulnerability_id VCID-7q9n-v18z-z7av
summary Stack-based buffer overflow in Xine-lib-rc5 in xine-lib 1_rc5-r2 and earlier allows remote attackers to execute arbitrary code via crafted playlists that result in a long vcd:// URL.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1455
reference_id
reference_type
scores
0
value 0.04348
scoring_system epss
scoring_elements 0.88888
published_at 2026-04-01T12:55:00Z
1
value 0.04348
scoring_system epss
scoring_elements 0.88896
published_at 2026-04-02T12:55:00Z
2
value 0.04348
scoring_system epss
scoring_elements 0.88912
published_at 2026-04-04T12:55:00Z
3
value 0.04348
scoring_system epss
scoring_elements 0.88915
published_at 2026-04-07T12:55:00Z
4
value 0.04348
scoring_system epss
scoring_elements 0.88933
published_at 2026-04-08T12:55:00Z
5
value 0.04348
scoring_system epss
scoring_elements 0.88938
published_at 2026-04-09T12:55:00Z
6
value 0.04348
scoring_system epss
scoring_elements 0.8895
published_at 2026-04-11T12:55:00Z
7
value 0.04348
scoring_system epss
scoring_elements 0.88944
published_at 2026-04-12T12:55:00Z
8
value 0.04348
scoring_system epss
scoring_elements 0.88943
published_at 2026-04-13T12:55:00Z
9
value 0.04348
scoring_system epss
scoring_elements 0.88956
published_at 2026-04-16T12:55:00Z
10
value 0.04348
scoring_system epss
scoring_elements 0.88954
published_at 2026-04-18T12:55:00Z
11
value 0.04348
scoring_system epss
scoring_elements 0.88951
published_at 2026-04-21T12:55:00Z
12
value 0.04348
scoring_system epss
scoring_elements 0.88968
published_at 2026-04-24T12:55:00Z
13
value 0.04348
scoring_system epss
scoring_elements 0.88975
published_at 2026-04-26T12:55:00Z
14
value 0.04348
scoring_system epss
scoring_elements 0.88976
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1455
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2004-1455
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7q9n-v18z-z7av
2
url VCID-8q82-evfa-s7fm
vulnerability_id VCID-8q82-evfa-s7fm
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2396.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2396
reference_id
reference_type
scores
0
value 0.02464
scoring_system epss
scoring_elements 0.85303
published_at 2026-04-29T12:55:00Z
1
value 0.02464
scoring_system epss
scoring_elements 0.85296
published_at 2026-04-24T12:55:00Z
2
value 0.02464
scoring_system epss
scoring_elements 0.85305
published_at 2026-04-26T12:55:00Z
3
value 0.02464
scoring_system epss
scoring_elements 0.85211
published_at 2026-04-04T12:55:00Z
4
value 0.02464
scoring_system epss
scoring_elements 0.85213
published_at 2026-04-07T12:55:00Z
5
value 0.02464
scoring_system epss
scoring_elements 0.85235
published_at 2026-04-08T12:55:00Z
6
value 0.02464
scoring_system epss
scoring_elements 0.85243
published_at 2026-04-09T12:55:00Z
7
value 0.02464
scoring_system epss
scoring_elements 0.85258
published_at 2026-04-11T12:55:00Z
8
value 0.02464
scoring_system epss
scoring_elements 0.85255
published_at 2026-04-12T12:55:00Z
9
value 0.02464
scoring_system epss
scoring_elements 0.85252
published_at 2026-04-13T12:55:00Z
10
value 0.02464
scoring_system epss
scoring_elements 0.85272
published_at 2026-04-16T12:55:00Z
11
value 0.02464
scoring_system epss
scoring_elements 0.85274
published_at 2026-04-18T12:55:00Z
12
value 0.02464
scoring_system epss
scoring_elements 0.85273
published_at 2026-04-21T12:55:00Z
13
value 0.02478
scoring_system epss
scoring_elements 0.85226
published_at 2026-04-02T12:55:00Z
14
value 0.02478
scoring_system epss
scoring_elements 0.85214
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2396
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=818583
reference_id 818583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=818583
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18757.txt
reference_id CVE-2012-2396;OSVDB-81224
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18757.txt
5
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2012-2396
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8q82-evfa-s7fm
3
url VCID-cgzb-rvv6-77ga
vulnerability_id VCID-cgzb-rvv6-77ga
summary
xine-lib contains several vulnerabilities potentially allowing the
    execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1476
reference_id
reference_type
scores
0
value 0.02053
scoring_system epss
scoring_elements 0.83811
published_at 2026-04-01T12:55:00Z
1
value 0.02053
scoring_system epss
scoring_elements 0.83824
published_at 2026-04-02T12:55:00Z
2
value 0.02053
scoring_system epss
scoring_elements 0.8384
published_at 2026-04-04T12:55:00Z
3
value 0.02053
scoring_system epss
scoring_elements 0.83842
published_at 2026-04-07T12:55:00Z
4
value 0.02053
scoring_system epss
scoring_elements 0.83865
published_at 2026-04-08T12:55:00Z
5
value 0.02053
scoring_system epss
scoring_elements 0.83871
published_at 2026-04-09T12:55:00Z
6
value 0.02053
scoring_system epss
scoring_elements 0.83888
published_at 2026-04-11T12:55:00Z
7
value 0.02053
scoring_system epss
scoring_elements 0.83881
published_at 2026-04-12T12:55:00Z
8
value 0.02053
scoring_system epss
scoring_elements 0.83877
published_at 2026-04-13T12:55:00Z
9
value 0.02053
scoring_system epss
scoring_elements 0.8391
published_at 2026-04-21T12:55:00Z
10
value 0.02053
scoring_system epss
scoring_elements 0.83936
published_at 2026-04-24T12:55:00Z
11
value 0.02053
scoring_system epss
scoring_elements 0.83943
published_at 2026-04-26T12:55:00Z
12
value 0.02053
scoring_system epss
scoring_elements 0.83948
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1476
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1476
2
reference_url https://security.gentoo.org/glsa/200409-30
reference_id GLSA-200409-30
reference_type
scores
url https://security.gentoo.org/glsa/200409-30
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2004-1476
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cgzb-rvv6-77ga
4
url VCID-cr56-z48y-v7fh
vulnerability_id VCID-cr56-z48y-v7fh
summary xine-lib contains an exploitable buffer overflow in the VCD handling code
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1475
reference_id
reference_type
scores
0
value 0.05483
scoring_system epss
scoring_elements 0.90167
published_at 2026-04-01T12:55:00Z
1
value 0.05483
scoring_system epss
scoring_elements 0.90169
published_at 2026-04-02T12:55:00Z
2
value 0.05483
scoring_system epss
scoring_elements 0.90181
published_at 2026-04-04T12:55:00Z
3
value 0.05483
scoring_system epss
scoring_elements 0.90187
published_at 2026-04-07T12:55:00Z
4
value 0.05483
scoring_system epss
scoring_elements 0.90203
published_at 2026-04-08T12:55:00Z
5
value 0.05483
scoring_system epss
scoring_elements 0.90208
published_at 2026-04-09T12:55:00Z
6
value 0.05483
scoring_system epss
scoring_elements 0.90217
published_at 2026-04-11T12:55:00Z
7
value 0.05483
scoring_system epss
scoring_elements 0.90216
published_at 2026-04-12T12:55:00Z
8
value 0.05483
scoring_system epss
scoring_elements 0.90211
published_at 2026-04-13T12:55:00Z
9
value 0.05483
scoring_system epss
scoring_elements 0.90229
published_at 2026-04-18T12:55:00Z
10
value 0.05483
scoring_system epss
scoring_elements 0.90225
published_at 2026-04-21T12:55:00Z
11
value 0.05483
scoring_system epss
scoring_elements 0.90239
published_at 2026-04-26T12:55:00Z
12
value 0.05483
scoring_system epss
scoring_elements 0.90235
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1475
1
reference_url https://security.gentoo.org/glsa/200408-18
reference_id GLSA-200408-18
reference_type
scores
url https://security.gentoo.org/glsa/200408-18
2
reference_url https://security.gentoo.org/glsa/200409-30
reference_id GLSA-200409-30
reference_type
scores
url https://security.gentoo.org/glsa/200409-30
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/386.c
reference_id OSVDB-10041;CVE-2004-1475
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/386.c
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2004-1475
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cr56-z48y-v7fh
5
url VCID-czjq-xn4q-qye6
vulnerability_id VCID-czjq-xn4q-qye6
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
1
reference_url http://osvdb.org/47677
reference_id
reference_type
scores
url http://osvdb.org/47677
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5246
reference_id
reference_type
scores
0
value 0.04348
scoring_system epss
scoring_elements 0.88976
published_at 2026-04-29T12:55:00Z
1
value 0.04348
scoring_system epss
scoring_elements 0.88889
published_at 2026-04-01T12:55:00Z
2
value 0.04348
scoring_system epss
scoring_elements 0.88898
published_at 2026-04-02T12:55:00Z
3
value 0.04348
scoring_system epss
scoring_elements 0.88914
published_at 2026-04-04T12:55:00Z
4
value 0.04348
scoring_system epss
scoring_elements 0.88916
published_at 2026-04-07T12:55:00Z
5
value 0.04348
scoring_system epss
scoring_elements 0.88934
published_at 2026-04-08T12:55:00Z
6
value 0.04348
scoring_system epss
scoring_elements 0.88939
published_at 2026-04-09T12:55:00Z
7
value 0.04348
scoring_system epss
scoring_elements 0.88951
published_at 2026-04-11T12:55:00Z
8
value 0.04348
scoring_system epss
scoring_elements 0.88945
published_at 2026-04-12T12:55:00Z
9
value 0.04348
scoring_system epss
scoring_elements 0.88944
published_at 2026-04-13T12:55:00Z
10
value 0.04348
scoring_system epss
scoring_elements 0.88957
published_at 2026-04-16T12:55:00Z
11
value 0.04348
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-18T12:55:00Z
12
value 0.04348
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-21T12:55:00Z
13
value 0.04348
scoring_system epss
scoring_elements 0.88969
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5246
3
reference_url http://securitytracker.com/id?1020703
reference_id
reference_type
scores
url http://securitytracker.com/id?1020703
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44468
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44468
5
reference_url http://sourceforge.net/project/shownotes.php?release_id=619869
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=619869
6
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:020
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:020
7
reference_url http://www.securityfocus.com/bid/30698
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30698
8
reference_url http://www.vupen.com/english/advisories/2008/2382
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2382
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5246
reference_id CVE-2008-5246
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5246
58
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
59
reference_url https://usn.ubuntu.com/710-1/
reference_id USN-710-1
reference_type
scores
url https://usn.ubuntu.com/710-1/
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5246
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-czjq-xn4q-qye6
6
url VCID-dphy-1hau-gqgz
vulnerability_id VCID-dphy-1hau-gqgz
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=blobdiff%3Bf=bin/winvlc.c%3Bh=ac9b97ca9f5f9ba001f13bf61eb5127a1c1dbcbf%3Bhp=2d09cba320e3b0def7069ce1ebab25d1340161c5%3Bhb=43a31df56c37bd62c691cdbe3c1f11babd164b56%3Bhpb=2d366da738b19f8d761d7084746c6db6f52808c6
reference_id
reference_type
scores
url http://git.videolan.org/?p=vlc/vlc-1.1.git%3Ba=blobdiff%3Bf=bin/winvlc.c%3Bh=ac9b97ca9f5f9ba001f13bf61eb5127a1c1dbcbf%3Bhp=2d09cba320e3b0def7069ce1ebab25d1340161c5%3Bhb=43a31df56c37bd62c691cdbe3c1f11babd164b56%3Bhpb=2d366da738b19f8d761d7084746c6db6f52808c6
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3124
reference_id
reference_type
scores
0
value 0.08392
scoring_system epss
scoring_elements 0.92337
published_at 2026-04-26T12:55:00Z
1
value 0.08392
scoring_system epss
scoring_elements 0.92283
published_at 2026-04-01T12:55:00Z
2
value 0.08392
scoring_system epss
scoring_elements 0.9229
published_at 2026-04-02T12:55:00Z
3
value 0.08392
scoring_system epss
scoring_elements 0.92295
published_at 2026-04-04T12:55:00Z
4
value 0.08392
scoring_system epss
scoring_elements 0.92298
published_at 2026-04-07T12:55:00Z
5
value 0.08392
scoring_system epss
scoring_elements 0.9231
published_at 2026-04-08T12:55:00Z
6
value 0.08392
scoring_system epss
scoring_elements 0.92314
published_at 2026-04-09T12:55:00Z
7
value 0.08392
scoring_system epss
scoring_elements 0.9232
published_at 2026-04-11T12:55:00Z
8
value 0.08392
scoring_system epss
scoring_elements 0.92321
published_at 2026-04-12T12:55:00Z
9
value 0.08392
scoring_system epss
scoring_elements 0.92319
published_at 2026-04-13T12:55:00Z
10
value 0.08392
scoring_system epss
scoring_elements 0.92332
published_at 2026-04-29T12:55:00Z
11
value 0.08392
scoring_system epss
scoring_elements 0.92331
published_at 2026-04-18T12:55:00Z
12
value 0.08392
scoring_system epss
scoring_elements 0.92336
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3124
2
reference_url http://secunia.com/advisories/41107
reference_id
reference_type
scores
url http://secunia.com/advisories/41107
3
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12190
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12190
4
reference_url http://www.exploit-db.com/exploits/14750
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/14750
5
reference_url http://www.openwall.com/lists/oss-security/2010/08/25/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/08/25/10
6
reference_url http://www.openwall.com/lists/oss-security/2010/08/25/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/08/25/9
7
reference_url http://www.vupen.com/english/advisories/2010/2172
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2172
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3124
reference_id CVE-2010-3124
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3124
74
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14750.txt
reference_id CVE-2010-3124;OSVDB-67492
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14750.txt
75
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2010-3124
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dphy-1hau-gqgz
7
url VCID-f75g-5ga6-7qgh
vulnerability_id VCID-f75g-5ga6-7qgh
summary codec\libpng_plugin.dll in VideoLAN VLC Media Player 2.1.3 allows remote attackers to cause a denial of service (crash) via a crafted .png file, as demonstrated by a png in a .wave file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3441
reference_id
reference_type
scores
0
value 0.07967
scoring_system epss
scoring_elements 0.92042
published_at 2026-04-01T12:55:00Z
1
value 0.07967
scoring_system epss
scoring_elements 0.92048
published_at 2026-04-02T12:55:00Z
2
value 0.07967
scoring_system epss
scoring_elements 0.92055
published_at 2026-04-04T12:55:00Z
3
value 0.07967
scoring_system epss
scoring_elements 0.9206
published_at 2026-04-07T12:55:00Z
4
value 0.07967
scoring_system epss
scoring_elements 0.92072
published_at 2026-04-08T12:55:00Z
5
value 0.07967
scoring_system epss
scoring_elements 0.92075
published_at 2026-04-13T12:55:00Z
6
value 0.07967
scoring_system epss
scoring_elements 0.92079
published_at 2026-04-12T12:55:00Z
7
value 0.07967
scoring_system epss
scoring_elements 0.92086
published_at 2026-04-26T12:55:00Z
8
value 0.07967
scoring_system epss
scoring_elements 0.92084
published_at 2026-04-18T12:55:00Z
9
value 0.07967
scoring_system epss
scoring_elements 0.92082
published_at 2026-04-21T12:55:00Z
10
value 0.07967
scoring_system epss
scoring_elements 0.92083
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3441
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39177.py
reference_id CVE-2014-3441;OSVDB-106843
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/39177.py
2
reference_url https://www.securityfocus.com/bid/67315/info
reference_id CVE-2014-3441;OSVDB-106843
reference_type exploit
scores
url https://www.securityfocus.com/bid/67315/info
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-3441
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f75g-5ga6-7qgh
8
url VCID-f8gy-t4tp-8ugv
vulnerability_id VCID-f8gy-t4tp-8ugv
summary Buffer overflow in the open_aiff_file function in demux_aiff.c for xine-lib (libxine) 1-rc7 allows remote attackers to execute arbitrary code via a crafted AIFF file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1300
reference_id
reference_type
scores
0
value 0.09687
scoring_system epss
scoring_elements 0.92939
published_at 2026-04-29T12:55:00Z
1
value 0.09687
scoring_system epss
scoring_elements 0.92892
published_at 2026-04-01T12:55:00Z
2
value 0.09687
scoring_system epss
scoring_elements 0.929
published_at 2026-04-02T12:55:00Z
3
value 0.09687
scoring_system epss
scoring_elements 0.92904
published_at 2026-04-07T12:55:00Z
4
value 0.09687
scoring_system epss
scoring_elements 0.92911
published_at 2026-04-08T12:55:00Z
5
value 0.09687
scoring_system epss
scoring_elements 0.92916
published_at 2026-04-09T12:55:00Z
6
value 0.09687
scoring_system epss
scoring_elements 0.92921
published_at 2026-04-11T12:55:00Z
7
value 0.09687
scoring_system epss
scoring_elements 0.92919
published_at 2026-04-12T12:55:00Z
8
value 0.09687
scoring_system epss
scoring_elements 0.9292
published_at 2026-04-13T12:55:00Z
9
value 0.09687
scoring_system epss
scoring_elements 0.92931
published_at 2026-04-16T12:55:00Z
10
value 0.09687
scoring_system epss
scoring_elements 0.92933
published_at 2026-04-18T12:55:00Z
11
value 0.09687
scoring_system epss
scoring_elements 0.92938
published_at 2026-04-21T12:55:00Z
12
value 0.09687
scoring_system epss
scoring_elements 0.92941
published_at 2026-04-24T12:55:00Z
13
value 0.09687
scoring_system epss
scoring_elements 0.92943
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1300
1
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18611
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18611
2
reference_url http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt
reference_id
reference_type
scores
url http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt
3
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:011
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:011
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1300
reference_id CVE-2004-1300
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1300
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24978.txt
reference_id CVE-2004-1300;OSVDB-12474
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24978.txt
7
reference_url https://www.securityfocus.com/bid/11969/info
reference_id CVE-2004-1300;OSVDB-12474
reference_type exploit
scores
url https://www.securityfocus.com/bid/11969/info
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2004-1300
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8gy-t4tp-8ugv
9
url VCID-nnx3-tewc-vfgx
vulnerability_id VCID-nnx3-tewc-vfgx
summary VLC media player 1.1.11 allows remote attackers to cause a denial of service (crash) via a long string in an amr file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0904
reference_id
reference_type
scores
0
value 0.08336
scoring_system epss
scoring_elements 0.92251
published_at 2026-04-01T12:55:00Z
1
value 0.08336
scoring_system epss
scoring_elements 0.92258
published_at 2026-04-02T12:55:00Z
2
value 0.08336
scoring_system epss
scoring_elements 0.92264
published_at 2026-04-04T12:55:00Z
3
value 0.08336
scoring_system epss
scoring_elements 0.92266
published_at 2026-04-07T12:55:00Z
4
value 0.08336
scoring_system epss
scoring_elements 0.92278
published_at 2026-04-08T12:55:00Z
5
value 0.08336
scoring_system epss
scoring_elements 0.92282
published_at 2026-04-09T12:55:00Z
6
value 0.08336
scoring_system epss
scoring_elements 0.92288
published_at 2026-04-11T12:55:00Z
7
value 0.08336
scoring_system epss
scoring_elements 0.92289
published_at 2026-04-12T12:55:00Z
8
value 0.08336
scoring_system epss
scoring_elements 0.92286
published_at 2026-04-13T12:55:00Z
9
value 0.08336
scoring_system epss
scoring_elements 0.92298
published_at 2026-04-21T12:55:00Z
10
value 0.08336
scoring_system epss
scoring_elements 0.92303
published_at 2026-04-24T12:55:00Z
11
value 0.08336
scoring_system epss
scoring_elements 0.92304
published_at 2026-04-26T12:55:00Z
12
value 0.08336
scoring_system epss
scoring_elements 0.923
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0904
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18309.pl
reference_id OSVDB-78618;CVE-2012-0904
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18309.pl
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2012-0904
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nnx3-tewc-vfgx
10
url VCID-pwwt-2djv-nfdj
vulnerability_id VCID-pwwt-2djv-nfdj
summary Stack-based buffer overflow in the Win32AddConnection function in modules/access/smb.c in VideoLAN VLC media player 0.9.9, when running on Microsoft Windows, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long smb URI in a playlist file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2484
reference_id
reference_type
scores
0
value 0.71229
scoring_system epss
scoring_elements 0.98702
published_at 2026-04-01T12:55:00Z
1
value 0.71229
scoring_system epss
scoring_elements 0.98703
published_at 2026-04-02T12:55:00Z
2
value 0.71229
scoring_system epss
scoring_elements 0.98706
published_at 2026-04-04T12:55:00Z
3
value 0.71229
scoring_system epss
scoring_elements 0.9871
published_at 2026-04-09T12:55:00Z
4
value 0.71229
scoring_system epss
scoring_elements 0.98713
published_at 2026-04-12T12:55:00Z
5
value 0.71229
scoring_system epss
scoring_elements 0.98714
published_at 2026-04-13T12:55:00Z
6
value 0.71229
scoring_system epss
scoring_elements 0.98716
published_at 2026-04-16T12:55:00Z
7
value 0.71229
scoring_system epss
scoring_elements 0.98718
published_at 2026-04-18T12:55:00Z
8
value 0.71229
scoring_system epss
scoring_elements 0.98719
published_at 2026-04-21T12:55:00Z
9
value 0.71229
scoring_system epss
scoring_elements 0.98723
published_at 2026-04-26T12:55:00Z
10
value 0.71229
scoring_system epss
scoring_elements 0.98725
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2484
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/local/16678.rb
reference_id CVE-2009-2484;OSVDB-55509
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/local/16678.rb
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/9029.rb
reference_id OSVDB-55509;CVE-2009-2484
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/9029.rb
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2009-2484
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwwt-2djv-nfdj
11
url VCID-q6jt-16jx-kyf3
vulnerability_id VCID-q6jt-16jx-kyf3
summary A binary hijacking vulnerability exists within the VideoLAN VLC media player before 3.0.19 on Windows. The uninstaller attempts to execute code with elevated privileges out of a standard user writable location. Standard users may use this to gain arbitrary code execution as SYSTEM.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46814
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28578
published_at 2026-04-29T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.29045
published_at 2026-04-02T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.29095
published_at 2026-04-04T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28904
published_at 2026-04-07T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28971
published_at 2026-04-08T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.29014
published_at 2026-04-09T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.29018
published_at 2026-04-11T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28973
published_at 2026-04-12T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28923
published_at 2026-04-13T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.28948
published_at 2026-04-16T12:55:00Z
10
value 0.00107
scoring_system epss
scoring_elements 0.28924
published_at 2026-04-18T12:55:00Z
11
value 0.00107
scoring_system epss
scoring_elements 0.28878
published_at 2026-04-21T12:55:00Z
12
value 0.00107
scoring_system epss
scoring_elements 0.28758
published_at 2026-04-24T12:55:00Z
13
value 0.00107
scoring_system epss
scoring_elements 0.28647
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46814
1
reference_url https://www.videolan.org/security/sb-vlc3019.html
reference_id sb-vlc3019.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T15:15:48Z/
url https://www.videolan.org/security/sb-vlc3019.html
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2023-46814
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q6jt-16jx-kyf3
12
url VCID-qb91-xxjz-7ka2
vulnerability_id VCID-qb91-xxjz-7ka2
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5248
reference_id
reference_type
scores
0
value 0.00564
scoring_system epss
scoring_elements 0.68493
published_at 2026-04-29T12:55:00Z
1
value 0.00564
scoring_system epss
scoring_elements 0.68339
published_at 2026-04-01T12:55:00Z
2
value 0.00564
scoring_system epss
scoring_elements 0.68359
published_at 2026-04-02T12:55:00Z
3
value 0.00564
scoring_system epss
scoring_elements 0.68378
published_at 2026-04-04T12:55:00Z
4
value 0.00564
scoring_system epss
scoring_elements 0.68355
published_at 2026-04-07T12:55:00Z
5
value 0.00564
scoring_system epss
scoring_elements 0.68406
published_at 2026-04-08T12:55:00Z
6
value 0.00564
scoring_system epss
scoring_elements 0.68423
published_at 2026-04-09T12:55:00Z
7
value 0.00564
scoring_system epss
scoring_elements 0.68449
published_at 2026-04-11T12:55:00Z
8
value 0.00564
scoring_system epss
scoring_elements 0.68437
published_at 2026-04-12T12:55:00Z
9
value 0.00564
scoring_system epss
scoring_elements 0.68404
published_at 2026-04-13T12:55:00Z
10
value 0.00564
scoring_system epss
scoring_elements 0.68442
published_at 2026-04-16T12:55:00Z
11
value 0.00564
scoring_system epss
scoring_elements 0.68456
published_at 2026-04-18T12:55:00Z
12
value 0.00564
scoring_system epss
scoring_elements 0.68434
published_at 2026-04-21T12:55:00Z
13
value 0.00564
scoring_system epss
scoring_elements 0.68482
published_at 2026-04-24T12:55:00Z
14
value 0.00564
scoring_system epss
scoring_elements 0.68487
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5248
2
reference_url http://sourceforge.net/project/shownotes.php?release_id=619869
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=619869
3
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:298
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:298
4
reference_url http://www.securityfocus.com/bid/32505
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32505
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5248
reference_id CVE-2008-5248
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5248
55
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
56
reference_url https://usn.ubuntu.com/710-1/
reference_id USN-710-1
reference_type
scores
url https://usn.ubuntu.com/710-1/
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5248
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qb91-xxjz-7ka2
13
url VCID-s3wy-3zks-4bcj
vulnerability_id VCID-s3wy-3zks-4bcj
summary
Multiple vulnerabilities have been found in VLC allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9625
reference_id
reference_type
scores
0
value 0.01634
scoring_system epss
scoring_elements 0.81844
published_at 2026-04-01T12:55:00Z
1
value 0.01634
scoring_system epss
scoring_elements 0.81855
published_at 2026-04-02T12:55:00Z
2
value 0.01634
scoring_system epss
scoring_elements 0.81878
published_at 2026-04-04T12:55:00Z
3
value 0.01634
scoring_system epss
scoring_elements 0.81874
published_at 2026-04-07T12:55:00Z
4
value 0.01634
scoring_system epss
scoring_elements 0.81901
published_at 2026-04-08T12:55:00Z
5
value 0.01634
scoring_system epss
scoring_elements 0.81907
published_at 2026-04-09T12:55:00Z
6
value 0.01634
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-11T12:55:00Z
7
value 0.01634
scoring_system epss
scoring_elements 0.81915
published_at 2026-04-12T12:55:00Z
8
value 0.01634
scoring_system epss
scoring_elements 0.8191
published_at 2026-04-13T12:55:00Z
9
value 0.01634
scoring_system epss
scoring_elements 0.81946
published_at 2026-04-18T12:55:00Z
10
value 0.01634
scoring_system epss
scoring_elements 0.81948
published_at 2026-04-21T12:55:00Z
11
value 0.01634
scoring_system epss
scoring_elements 0.8197
published_at 2026-04-24T12:55:00Z
12
value 0.01634
scoring_system epss
scoring_elements 0.81981
published_at 2026-04-26T12:55:00Z
13
value 0.01634
scoring_system epss
scoring_elements 0.81987
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9625
1
reference_url https://security.gentoo.org/glsa/201603-08
reference_id GLSA-201603-08
reference_type
scores
url https://security.gentoo.org/glsa/201603-08
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2014-9625
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3wy-3zks-4bcj
14
url VCID-v6g4-5jg7-fkad
vulnerability_id VCID-v6g4-5jg7-fkad
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1274.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1274.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1274
reference_id
reference_type
scores
0
value 0.04836
scoring_system epss
scoring_elements 0.89485
published_at 2026-04-01T12:55:00Z
1
value 0.04836
scoring_system epss
scoring_elements 0.89488
published_at 2026-04-02T12:55:00Z
2
value 0.04836
scoring_system epss
scoring_elements 0.895
published_at 2026-04-07T12:55:00Z
3
value 0.04836
scoring_system epss
scoring_elements 0.89516
published_at 2026-04-08T12:55:00Z
4
value 0.04836
scoring_system epss
scoring_elements 0.8952
published_at 2026-04-13T12:55:00Z
5
value 0.04836
scoring_system epss
scoring_elements 0.89527
published_at 2026-04-11T12:55:00Z
6
value 0.04836
scoring_system epss
scoring_elements 0.89525
published_at 2026-04-12T12:55:00Z
7
value 0.04836
scoring_system epss
scoring_elements 0.89534
published_at 2026-04-16T12:55:00Z
8
value 0.04836
scoring_system epss
scoring_elements 0.89535
published_at 2026-04-18T12:55:00Z
9
value 0.04836
scoring_system epss
scoring_elements 0.89533
published_at 2026-04-21T12:55:00Z
10
value 0.04836
scoring_system epss
scoring_elements 0.89548
published_at 2026-04-24T12:55:00Z
11
value 0.04836
scoring_system epss
scoring_elements 0.89552
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1274
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=495031
reference_id 495031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=495031
3
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
4
reference_url https://usn.ubuntu.com/763-1/
reference_id USN-763-1
reference_type
scores
url https://usn.ubuntu.com/763-1/
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2009-1274
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6g4-5jg7-fkad
15
url VCID-v8gd-4b6v-6qaw
vulnerability_id VCID-v8gd-4b6v-6qaw
summary
Multiple vulnerabilities have been found in VLC, the worst of which
    could lead to user-assisted execution of arbitrary code.
references
0
reference_url http://marc.info/?l=oss-security&m=135274330022215&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=135274330022215&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5855
reference_id
reference_type
scores
0
value 0.00344
scoring_system epss
scoring_elements 0.56983
published_at 2026-04-26T12:55:00Z
1
value 0.00344
scoring_system epss
scoring_elements 0.56912
published_at 2026-04-01T12:55:00Z
2
value 0.00344
scoring_system epss
scoring_elements 0.57009
published_at 2026-04-02T12:55:00Z
3
value 0.00344
scoring_system epss
scoring_elements 0.57031
published_at 2026-04-04T12:55:00Z
4
value 0.00344
scoring_system epss
scoring_elements 0.57008
published_at 2026-04-07T12:55:00Z
5
value 0.00344
scoring_system epss
scoring_elements 0.57058
published_at 2026-04-08T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.5706
published_at 2026-04-09T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.57071
published_at 2026-04-11T12:55:00Z
8
value 0.00344
scoring_system epss
scoring_elements 0.5705
published_at 2026-04-12T12:55:00Z
9
value 0.00344
scoring_system epss
scoring_elements 0.57027
published_at 2026-04-13T12:55:00Z
10
value 0.00344
scoring_system epss
scoring_elements 0.57055
published_at 2026-04-16T12:55:00Z
11
value 0.00344
scoring_system epss
scoring_elements 0.57052
published_at 2026-04-18T12:55:00Z
12
value 0.00344
scoring_system epss
scoring_elements 0.5703
published_at 2026-04-21T12:55:00Z
13
value 0.00344
scoring_system epss
scoring_elements 0.56964
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5855
2
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16781
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16781
3
reference_url http://www.securityfocus.com/archive/1/524626
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/524626
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5855
reference_id CVE-2012-5855
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5855
10
reference_url https://security.gentoo.org/glsa/201411-01
reference_id GLSA-201411-01
reference_type
scores
url https://security.gentoo.org/glsa/201411-01
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2012-5855
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v8gd-4b6v-6qaw
16
url VCID-vn64-q1cr-rub4
vulnerability_id VCID-vn64-q1cr-rub4
summary A certain ActiveX control in axvlc.dll in VideoLAN VLC 0.8.6 before 0.8.6d allows remote attackers to execute arbitrary code via crafted arguments to the (1) addTarget, (2) getVariable, or (3) setVariable function, resulting from a "bad initialized pointer," aka a "recursive plugin release vulnerability."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6262
reference_id
reference_type
scores
0
value 0.22802
scoring_system epss
scoring_elements 0.95842
published_at 2026-04-01T12:55:00Z
1
value 0.22802
scoring_system epss
scoring_elements 0.9585
published_at 2026-04-02T12:55:00Z
2
value 0.22802
scoring_system epss
scoring_elements 0.95859
published_at 2026-04-04T12:55:00Z
3
value 0.22802
scoring_system epss
scoring_elements 0.95862
published_at 2026-04-07T12:55:00Z
4
value 0.22802
scoring_system epss
scoring_elements 0.95871
published_at 2026-04-08T12:55:00Z
5
value 0.22802
scoring_system epss
scoring_elements 0.95874
published_at 2026-04-09T12:55:00Z
6
value 0.22802
scoring_system epss
scoring_elements 0.95877
published_at 2026-04-12T12:55:00Z
7
value 0.22802
scoring_system epss
scoring_elements 0.95879
published_at 2026-04-13T12:55:00Z
8
value 0.22802
scoring_system epss
scoring_elements 0.9589
published_at 2026-04-16T12:55:00Z
9
value 0.22802
scoring_system epss
scoring_elements 0.95896
published_at 2026-04-18T12:55:00Z
10
value 0.22802
scoring_system epss
scoring_elements 0.95898
published_at 2026-04-21T12:55:00Z
11
value 0.22802
scoring_system epss
scoring_elements 0.95899
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6262
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/4688.html
reference_id OSVDB-42192;CVE-2007-6262
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/4688.html
2
reference_url http://www.coresecurity.com/?action=item&id=2035
reference_id OSVDB-42192;CVE-2007-6262
reference_type exploit
scores
url http://www.coresecurity.com/?action=item&id=2035
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2007-6262
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vn64-q1cr-rub4
17
url VCID-xuxj-e3ez-g3bx
vulnerability_id VCID-xuxj-e3ez-g3bx
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://bugs.xine-project.org/show_bug.cgi?id=205
reference_id
reference_type
scores
url http://bugs.xine-project.org/show_bug.cgi?id=205
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0698
reference_id
reference_type
scores
0
value 0.02442
scoring_system epss
scoring_elements 0.85231
published_at 2026-04-29T12:55:00Z
1
value 0.02442
scoring_system epss
scoring_elements 0.85108
published_at 2026-04-01T12:55:00Z
2
value 0.02442
scoring_system epss
scoring_elements 0.85121
published_at 2026-04-02T12:55:00Z
3
value 0.02442
scoring_system epss
scoring_elements 0.85138
published_at 2026-04-04T12:55:00Z
4
value 0.02442
scoring_system epss
scoring_elements 0.85142
published_at 2026-04-07T12:55:00Z
5
value 0.02442
scoring_system epss
scoring_elements 0.85164
published_at 2026-04-08T12:55:00Z
6
value 0.02442
scoring_system epss
scoring_elements 0.85171
published_at 2026-04-09T12:55:00Z
7
value 0.02442
scoring_system epss
scoring_elements 0.85186
published_at 2026-04-11T12:55:00Z
8
value 0.02442
scoring_system epss
scoring_elements 0.85183
published_at 2026-04-12T12:55:00Z
9
value 0.02442
scoring_system epss
scoring_elements 0.8518
published_at 2026-04-13T12:55:00Z
10
value 0.02442
scoring_system epss
scoring_elements 0.85202
published_at 2026-04-16T12:55:00Z
11
value 0.02442
scoring_system epss
scoring_elements 0.85203
published_at 2026-04-21T12:55:00Z
12
value 0.02442
scoring_system epss
scoring_elements 0.85225
published_at 2026-04-24T12:55:00Z
13
value 0.02442
scoring_system epss
scoring_elements 0.85234
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0698
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/48954
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/48954
4
reference_url http://sourceforge.net/project/shownotes.php?release_id=660071
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=660071
5
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:298
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:298
6
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:299
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:299
7
reference_url http://www.securityfocus.com/archive/1/500514/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/500514/100/0/threaded
8
reference_url http://www.trapkit.de/advisories/TKADV2009-004.txt
reference_id
reference_type
scores
url http://www.trapkit.de/advisories/TKADV2009-004.txt
9
reference_url http://www.ubuntu.com/usn/USN-746-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-746-1
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.16.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0698
reference_id CVE-2009-0698
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0698
12
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
13
reference_url https://usn.ubuntu.com/746-1/
reference_id USN-746-1
reference_type
scores
url https://usn.ubuntu.com/746-1/
14
reference_url https://usn.ubuntu.com/763-1/
reference_id USN-763-1
reference_type
scores
url https://usn.ubuntu.com/763-1/
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2009-0698
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xuxj-e3ez-g3bx
18
url VCID-ys55-8nfw-cbc3
vulnerability_id VCID-ys55-8nfw-cbc3
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5233
reference_id
reference_type
scores
0
value 0.01413
scoring_system epss
scoring_elements 0.80613
published_at 2026-04-29T12:55:00Z
1
value 0.01413
scoring_system epss
scoring_elements 0.80479
published_at 2026-04-01T12:55:00Z
2
value 0.01413
scoring_system epss
scoring_elements 0.80485
published_at 2026-04-02T12:55:00Z
3
value 0.01413
scoring_system epss
scoring_elements 0.80506
published_at 2026-04-04T12:55:00Z
4
value 0.01413
scoring_system epss
scoring_elements 0.80496
published_at 2026-04-07T12:55:00Z
5
value 0.01413
scoring_system epss
scoring_elements 0.80526
published_at 2026-04-08T12:55:00Z
6
value 0.01413
scoring_system epss
scoring_elements 0.80536
published_at 2026-04-09T12:55:00Z
7
value 0.01413
scoring_system epss
scoring_elements 0.80554
published_at 2026-04-11T12:55:00Z
8
value 0.01413
scoring_system epss
scoring_elements 0.8054
published_at 2026-04-12T12:55:00Z
9
value 0.01413
scoring_system epss
scoring_elements 0.80533
published_at 2026-04-13T12:55:00Z
10
value 0.01413
scoring_system epss
scoring_elements 0.80562
published_at 2026-04-16T12:55:00Z
11
value 0.01413
scoring_system epss
scoring_elements 0.80564
published_at 2026-04-18T12:55:00Z
12
value 0.01413
scoring_system epss
scoring_elements 0.80567
published_at 2026-04-21T12:55:00Z
13
value 0.01413
scoring_system epss
scoring_elements 0.80593
published_at 2026-04-24T12:55:00Z
14
value 0.01413
scoring_system epss
scoring_elements 0.80596
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5233
2
reference_url http://secunia.com/advisories/31827
reference_id
reference_type
scores
url http://secunia.com/advisories/31827
3
reference_url http://securityreason.com/securityalert/4648
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4648
4
reference_url http://securitytracker.com/id?1020703
reference_id
reference_type
scores
url http://securitytracker.com/id?1020703
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44639
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44639
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44648
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44648
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44649
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44649
8
reference_url http://sourceforge.net/project/shownotes.php?release_id=619869
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=619869
9
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html
10
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:020
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:020
12
reference_url http://www.ocert.org/analysis/2008-008/analysis.txt
reference_id
reference_type
scores
url http://www.ocert.org/analysis/2008-008/analysis.txt
13
reference_url http://www.osvdb.org/47747
reference_id
reference_type
scores
url http://www.osvdb.org/47747
14
reference_url http://www.securityfocus.com/archive/1/495674/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495674/100/0/threaded
15
reference_url http://www.securityfocus.com/bid/30797
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30797
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5233
reference_id CVE-2008-5233
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5233
65
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
66
reference_url https://usn.ubuntu.com/710-1/
reference_id USN-710-1
reference_type
scores
url https://usn.ubuntu.com/710-1/
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5233
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ys55-8nfw-cbc3
19
url VCID-yzgd-n56h-gyfb
vulnerability_id VCID-yzgd-n56h-gyfb
summary
Multiple vulnerabilities in xine-lib might result in the remote execution
    of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5235.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5235.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5235
reference_id
reference_type
scores
0
value 0.03478
scoring_system epss
scoring_elements 0.876
published_at 2026-04-29T12:55:00Z
1
value 0.03478
scoring_system epss
scoring_elements 0.87508
published_at 2026-04-01T12:55:00Z
2
value 0.03478
scoring_system epss
scoring_elements 0.87518
published_at 2026-04-02T12:55:00Z
3
value 0.03478
scoring_system epss
scoring_elements 0.87532
published_at 2026-04-04T12:55:00Z
4
value 0.03478
scoring_system epss
scoring_elements 0.87535
published_at 2026-04-07T12:55:00Z
5
value 0.03478
scoring_system epss
scoring_elements 0.87554
published_at 2026-04-08T12:55:00Z
6
value 0.03478
scoring_system epss
scoring_elements 0.8756
published_at 2026-04-09T12:55:00Z
7
value 0.03478
scoring_system epss
scoring_elements 0.87572
published_at 2026-04-11T12:55:00Z
8
value 0.03478
scoring_system epss
scoring_elements 0.87568
published_at 2026-04-12T12:55:00Z
9
value 0.03478
scoring_system epss
scoring_elements 0.87564
published_at 2026-04-13T12:55:00Z
10
value 0.03478
scoring_system epss
scoring_elements 0.87578
published_at 2026-04-16T12:55:00Z
11
value 0.03478
scoring_system epss
scoring_elements 0.87579
published_at 2026-04-18T12:55:00Z
12
value 0.03478
scoring_system epss
scoring_elements 0.87577
published_at 2026-04-21T12:55:00Z
13
value 0.03478
scoring_system epss
scoring_elements 0.87595
published_at 2026-04-24T12:55:00Z
14
value 0.03478
scoring_system epss
scoring_elements 0.87602
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5235
3
reference_url http://secunia.com/advisories/31502
reference_id
reference_type
scores
url http://secunia.com/advisories/31502
4
reference_url http://securitytracker.com/id?1020703
reference_id
reference_type
scores
url http://securitytracker.com/id?1020703
5
reference_url http://sourceforge.net/project/shownotes.php?release_id=619869
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=619869
6
reference_url http://www.securityfocus.com/bid/30698
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30698
7
reference_url http://www.vupen.com/english/advisories/2008/2382
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2382
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=473234
reference_id 473234
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=473234
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:*
reference_id cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5235
reference_id CVE-2008-5235
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5235
48
reference_url https://security.gentoo.org/glsa/201006-04
reference_id GLSA-201006-04
reference_type
scores
url https://security.gentoo.org/glsa/201006-04
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2008-5235
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yzgd-n56h-gyfb
20
url VCID-zdpz-ctms-skgj
vulnerability_id VCID-zdpz-ctms-skgj
summary
xine-lib is vulnerable to multiple buffer overflows when processing FLAC
    and ASF streams.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1664
reference_id
reference_type
scores
0
value 0.06458
scoring_system epss
scoring_elements 0.91023
published_at 2026-04-01T12:55:00Z
1
value 0.06458
scoring_system epss
scoring_elements 0.91028
published_at 2026-04-02T12:55:00Z
2
value 0.06458
scoring_system epss
scoring_elements 0.91037
published_at 2026-04-04T12:55:00Z
3
value 0.06458
scoring_system epss
scoring_elements 0.91045
published_at 2026-04-07T12:55:00Z
4
value 0.06458
scoring_system epss
scoring_elements 0.91058
published_at 2026-04-08T12:55:00Z
5
value 0.06458
scoring_system epss
scoring_elements 0.91064
published_at 2026-04-09T12:55:00Z
6
value 0.06458
scoring_system epss
scoring_elements 0.91073
published_at 2026-04-13T12:55:00Z
7
value 0.06458
scoring_system epss
scoring_elements 0.91097
published_at 2026-04-18T12:55:00Z
8
value 0.06458
scoring_system epss
scoring_elements 0.911
published_at 2026-04-21T12:55:00Z
9
value 0.06458
scoring_system epss
scoring_elements 0.91113
published_at 2026-04-24T12:55:00Z
10
value 0.06458
scoring_system epss
scoring_elements 0.91111
published_at 2026-04-26T12:55:00Z
11
value 0.06458
scoring_system epss
scoring_elements 0.91106
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1664
1
reference_url https://security.gentoo.org/glsa/200604-16
reference_id GLSA-200604-16
reference_type
scores
url https://security.gentoo.org/glsa/200604-16
2
reference_url https://security.gentoo.org/glsa/200802-12
reference_id GLSA-200802-12
reference_type
scores
url https://security.gentoo.org/glsa/200802-12
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/1641.pl
reference_id OSVDB-42658;CVE-2008-1110;OSVDB-25004;CVE-2006-1664;OSVDB-24581
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/1641.pl
fixed_packages
0
url pkg:deb/debian/vlc@0?distro=trixie
purl pkg:deb/debian/vlc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie
1
url pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.21-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.21-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.22-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.22-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/vlc@3.0.23-1?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-1%3Fdistro=trixie
5
url pkg:deb/debian/vlc@3.0.23-3?distro=trixie
purl pkg:deb/debian/vlc@3.0.23-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@3.0.23-3%3Fdistro=trixie
aliases CVE-2006-1664
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdpz-ctms-skgj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/vlc@0%3Fdistro=trixie